Behavioral task
behavioral1
Sample
29685ceb2b365cccb57a1a4cf0dd196a456dda57b65e52f5616ffabfcb833c1c.doc
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
29685ceb2b365cccb57a1a4cf0dd196a456dda57b65e52f5616ffabfcb833c1c.doc
Resource
win10v2004-20221111-en
General
-
Target
29685ceb2b365cccb57a1a4cf0dd196a456dda57b65e52f5616ffabfcb833c1c
-
Size
66KB
-
MD5
f26cb0d400e1f842605077de2c231726
-
SHA1
ceb50aedb480fea8d5518d495699864fb0acb616
-
SHA256
29685ceb2b365cccb57a1a4cf0dd196a456dda57b65e52f5616ffabfcb833c1c
-
SHA512
54cfae52e822ed78b75ab8eaf38414f5e03e503046533509b6d3f262642a4b87a2d1c57663e6210c09edc20e13ce8b1583b5bd6ee8ea85b453bf5d90fd6b17f1
-
SSDEEP
768:kxKk8rDqXaDMDoIC1s6oY9uNIG+t0HQG8jvpt4V+fx3uYw4AiMQUvnqD:kCMaH9p08jvT50YXQ
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
Processes:
resource yara_rule sample office_macro_on_action -
Processes:
resource sample
Files
-
29685ceb2b365cccb57a1a4cf0dd196a456dda57b65e52f5616ffabfcb833c1c.doc windows office2003
ThisDocument